Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
TREND MICRO | TrendLabs 2014 Targeted Attack Campaign Report<br />
16. Jay Yaneza. (29 December 2014). TrendLabs Security Intelligence Blog. “64-bit Version of HAVEX Spotted.” Last accessed on 28<br />
March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/64-bit-version-of-havex-spotted/.<br />
17. Trend Micro Incorporated. (5 December 2014). TrendLabs Security Intelligence Blog. “WIPALL Malware Leads to #GOP Warning<br />
in Sony Hack.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/wipall-malwareleads-to-gop-warning-in-sony-hack/.<br />
18. Command Five Pty. Ltd. (September 2011). Command Five. “SK Hack by an Advanced Persistent Threat.” Last accessed on 28<br />
March 2015, https://www.commandfive.com/papers/C5_APT_SKHack.pdf.<br />
19. Benson Sy. (19 January 2015). TrendLabs Security Intelligence Blog. “PlugX Malware Found in Official Releases of League of<br />
Legends, Path of Exile.” Last accessed 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/plugxmalware-found-in-official-releases-of-league-of-legends-path-of-exile/.<br />
20. Christopher Daniel So. (18 August 2014). TrendLabs Security Intelligence Blog. “BIFROSE Now More Evasive Through Tor, Used<br />
for Targeted Attack.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/bifrose-nowmore-evasive-through-tor-used-for-targeted-attack/.<br />
21. Maersk Menrige. (25 June 2014). TrendLabs Security Intelligence Blog. “PlugX RAT with ‘Time Bomb’ Abuses Dropbox for<br />
Command-and-Control Settings.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/<br />
plugx-rat-with-time-bomb-abuses-dropbox-for-command-and-control-settings/.<br />
22. Trend Micro Incorporated. (12 May 2014). TrendLabs Security Intelligence Blog. “Targeted Attack Against Taiwanese Agencies<br />
Used Recent Microsoft Word Zero Day.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-securityintelligence/targeted-attack-against-taiwanese-agencies-used-recent-microsoft-word-zero-day/.<br />
23. Microsoft. (2014). Security TechCenter. “Microsoft Security Bulletin MS14-021—Critical.” Last accessed on 28 March 2015,<br />
https://technet.microsoft.com/library/security/ms14-021.<br />
24. William Gamazo Sanchez. (10 November 2014). TrendLabs Security Intelligence Blog. “Timeline of Sandworm Attacks.” Last<br />
accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/timeline-of-sandworm-attacks/.<br />
25. Jonathan Leopando. (21 October 2014). TrendLabs Security Intelligence Blog. “Microsoft Windows Hit by New Zero-Day Attack.”<br />
Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/microsoft-windows-hit-by-newzero-day-attack/.<br />
26. Kervin Alintanahin. (17 June 2014). TrendLabs Security Intelligence Blog. “PLEAD Targeted Attacks Against Taiwanese<br />
Government Agencies.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/pleadtargeted-attacks-against-taiwanese-government-agencies-2.<br />
27. Jayronn Christian Bucu. (18 September 2014). TrendLabs Security Intelligence Blog. “EvilGrab Malware Family Used in Targeted<br />
Attacks in Asia.” Last accessed on 28 March 2015, http://blog.trendmicro.com/trendlabs-security-intelligence/evilgrab-malwarefamily-used-in-targeted-attacks-in-asia/.<br />
28. Loucif Kharouni. (2014). Trend Micro Security Intelligence. “Cybercriminals Use What Works: Targeted Attack Methodologies for<br />
Cybercrime.” Last accessed on 28 March 2015, http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/whitepapers/wp-cybercriminals-use-what-works.pdf.<br />
29. Trend Micro Incorporated. (2015). Trend Micro. “Deep Discovery: Advanced Network Security.” Last accessed on 1 April 2015,<br />
http://www.trendmicro.com/us/enterprise/security-risk-management/deep-discovery/.<br />
30. Trend Micro Incorporated. (2015). Trend Micro. “Custom Defense Against Targeted Attacks.” Last accessed on 6 April 2015,<br />
http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_custom-defense-against-targeted-attacks.pdf.<br />
32 | Targeted Attack Trends